Types of policies in e-commerce, Computer Engineering

Assignment Help:

1- The Privacy Policy:

The vendor must explain to the customer how all his information especially sensitive ones will be totally private, and no one can read them or use them in any illegal issues.

2- The Security Policy:

The vendor must explain to the customer that the money information will be totally secured, like credit card details, and the customer will be informed when the money for the current operation gets decremented from his balance.

3- The Delivery and Shipping Policy:

The vendor must explain to the customer how and when the purchased products will be delivered, and if there are any charges for the shipment.

4- The Return Policy:

The vendor must explain if the purchased products could be returned or not, and if yes then they could be returned under what conditions, within how many days after the delivery.

5- The Replace or Refund Policy:

The vendor must explain when and how the customer returns the purchased product and the available options he can choose from.

6- Customer Satisfaction Policy:

The vendor must explain to the customer how to guarantee that he will be satisfied with the product or service, and how to measure his satisfaction. Also the vendor must take care of their feedbacks.

7- The Warranty Policy:

The vendor must explain to the customer if the purchased product will be under warranty or not and for how long, and under what conditions.

When a customer decides to purchase a product or to get a service online he should read carefully the policies of the vendor, so he knows how all his rights will be saved, as polices are not standard for all vendors, and not all vendors explain clearly their policies, so the customer must be careful to not be a victim of crooks.


Related Discussions:- Types of policies in e-commerce

Digital logic, write a short note on the tri state ttl inverter

write a short note on the tri state ttl inverter

Implement simplified expression using nor gates only, Q. For function F(x,y...

Q. For function F(x,y,z) = ∑m (1,2,3,5,6) using TRUTH TABLE only 1. Find POS expression 2. Implement this simplified expression using two level OR-to-AND gate network 3. I

Explain concurrent sharing, Explain Concurrent Sharing Here a number of...

Explain Concurrent Sharing Here a number of programs that may share a file simultaneously. While this is the case, it is necessary to prevent mutual interference among them. Th

What is the use of buffer register, What is the use of buffer register? ...

What is the use of buffer register? The buffer register is used to avoid speed mismatch among the I/O device and the processor.

What is gdpro and magicdraw uml, What is GDPro and  MagicDraw UML GDP...

What is GDPro and  MagicDraw UML GDPro : This  is a full suite of code  management tools and UML. MagicDraw UML: UML diagrams fully support this: MagicDraw RConverter a

How does tcp/ip decide the size of an ip fragment, How does TCP/IP decide t...

How does TCP/IP decide the size of an IP fragment? Explain. TCP/IP protocol utilizes the name IP datagram to refer to an Internet packet. The amount of data carried into a data

By which the speech of side tone is heard, Side tone is the speech heard by...

Side tone is the speech heard by (A)  the receiving subscriber (B)  both the receiving and calling subscriber (C) by on looker (D) by calling subscriber Ans

What is closed system, Closed System: It's isolated from environment influ...

Closed System: It's isolated from environment influences. It operates on factors within System itself. It is also described as a System which involves a feedback loop, a control e

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd